Loading...
1// SPDX-License-Identifier: GPL-2.0
2#include "util.h"
3#include "debug.h"
4#include "event.h"
5#include <api/fs/fs.h>
6#include <sys/stat.h>
7#include <sys/utsname.h>
8#include <dirent.h>
9#include <fcntl.h>
10#include <inttypes.h>
11#include <signal.h>
12#include <stdio.h>
13#include <stdlib.h>
14#include <string.h>
15#include <errno.h>
16#include <limits.h>
17#include <linux/capability.h>
18#include <linux/kernel.h>
19#include <linux/log2.h>
20#include <linux/time64.h>
21#include <linux/overflow.h>
22#include <unistd.h>
23#include "cap.h"
24#include "strlist.h"
25#include "string2.h"
26
27/*
28 * XXX We need to find a better place for these things...
29 */
30
31const char *input_name;
32
33bool perf_singlethreaded = true;
34
35void perf_set_singlethreaded(void)
36{
37 perf_singlethreaded = true;
38}
39
40void perf_set_multithreaded(void)
41{
42 perf_singlethreaded = false;
43}
44
45int sysctl_perf_event_max_stack = PERF_MAX_STACK_DEPTH;
46int sysctl_perf_event_max_contexts_per_stack = PERF_MAX_CONTEXTS_PER_STACK;
47
48int sysctl__max_stack(void)
49{
50 int value;
51
52 if (sysctl__read_int("kernel/perf_event_max_stack", &value) == 0)
53 sysctl_perf_event_max_stack = value;
54
55 if (sysctl__read_int("kernel/perf_event_max_contexts_per_stack", &value) == 0)
56 sysctl_perf_event_max_contexts_per_stack = value;
57
58 return sysctl_perf_event_max_stack;
59}
60
61bool sysctl__nmi_watchdog_enabled(void)
62{
63 static bool cached;
64 static bool nmi_watchdog;
65 int value;
66
67 if (cached)
68 return nmi_watchdog;
69
70 if (sysctl__read_int("kernel/nmi_watchdog", &value) < 0)
71 return false;
72
73 nmi_watchdog = (value > 0) ? true : false;
74 cached = true;
75
76 return nmi_watchdog;
77}
78
79bool test_attr__enabled;
80
81bool exclude_GH_default;
82
83bool perf_host = true;
84bool perf_guest = false;
85
86void event_attr_init(struct perf_event_attr *attr)
87{
88 /* to capture ABI version */
89 attr->size = sizeof(*attr);
90
91 if (!exclude_GH_default)
92 return;
93
94 if (!perf_host)
95 attr->exclude_host = 1;
96 if (!perf_guest)
97 attr->exclude_guest = 1;
98}
99
100int mkdir_p(char *path, mode_t mode)
101{
102 struct stat st;
103 int err;
104 char *d = path;
105
106 if (*d != '/')
107 return -1;
108
109 if (stat(path, &st) == 0)
110 return 0;
111
112 while (*++d == '/');
113
114 while ((d = strchr(d, '/'))) {
115 *d = '\0';
116 err = stat(path, &st) && mkdir(path, mode);
117 *d++ = '/';
118 if (err)
119 return -1;
120 while (*d == '/')
121 ++d;
122 }
123 return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
124}
125
126static bool match_pat(char *file, const char **pat)
127{
128 int i = 0;
129
130 if (!pat)
131 return true;
132
133 while (pat[i]) {
134 if (strglobmatch(file, pat[i]))
135 return true;
136
137 i++;
138 }
139
140 return false;
141}
142
143/*
144 * The depth specify how deep the removal will go.
145 * 0 - will remove only files under the 'path' directory
146 * 1 .. x - will dive in x-level deep under the 'path' directory
147 *
148 * If specified the pat is array of string patterns ended with NULL,
149 * which are checked upon every file/directory found. Only matching
150 * ones are removed.
151 *
152 * The function returns:
153 * 0 on success
154 * -1 on removal failure with errno set
155 * -2 on pattern failure
156 */
157static int rm_rf_depth_pat(const char *path, int depth, const char **pat)
158{
159 DIR *dir;
160 int ret;
161 struct dirent *d;
162 char namebuf[PATH_MAX];
163 struct stat statbuf;
164
165 /* Do not fail if there's no file. */
166 ret = lstat(path, &statbuf);
167 if (ret)
168 return 0;
169
170 /* Try to remove any file we get. */
171 if (!(statbuf.st_mode & S_IFDIR))
172 return unlink(path);
173
174 /* We have directory in path. */
175 dir = opendir(path);
176 if (dir == NULL)
177 return -1;
178
179 while ((d = readdir(dir)) != NULL && !ret) {
180
181 if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
182 continue;
183
184 if (!match_pat(d->d_name, pat)) {
185 ret = -2;
186 break;
187 }
188
189 scnprintf(namebuf, sizeof(namebuf), "%s/%s",
190 path, d->d_name);
191
192 /* We have to check symbolic link itself */
193 ret = lstat(namebuf, &statbuf);
194 if (ret < 0) {
195 pr_debug("stat failed: %s\n", namebuf);
196 break;
197 }
198
199 if (S_ISDIR(statbuf.st_mode))
200 ret = depth ? rm_rf_depth_pat(namebuf, depth - 1, pat) : 0;
201 else
202 ret = unlink(namebuf);
203 }
204 closedir(dir);
205
206 if (ret < 0)
207 return ret;
208
209 return rmdir(path);
210}
211
212static int rm_rf_a_kcore_dir(const char *path, const char *name)
213{
214 char kcore_dir_path[PATH_MAX];
215 const char *pat[] = {
216 "kcore",
217 "kallsyms",
218 "modules",
219 NULL,
220 };
221
222 snprintf(kcore_dir_path, sizeof(kcore_dir_path), "%s/%s", path, name);
223
224 return rm_rf_depth_pat(kcore_dir_path, 0, pat);
225}
226
227static bool kcore_dir_filter(const char *name __maybe_unused, struct dirent *d)
228{
229 const char *pat[] = {
230 "kcore_dir",
231 "kcore_dir__[1-9]*",
232 NULL,
233 };
234
235 return match_pat(d->d_name, pat);
236}
237
238static int rm_rf_kcore_dir(const char *path)
239{
240 struct strlist *kcore_dirs;
241 struct str_node *nd;
242 int ret;
243
244 kcore_dirs = lsdir(path, kcore_dir_filter);
245
246 if (!kcore_dirs)
247 return 0;
248
249 strlist__for_each_entry(nd, kcore_dirs) {
250 ret = rm_rf_a_kcore_dir(path, nd->s);
251 if (ret)
252 return ret;
253 }
254
255 strlist__delete(kcore_dirs);
256
257 return 0;
258}
259
260int rm_rf_perf_data(const char *path)
261{
262 const char *pat[] = {
263 "data",
264 "data.*",
265 NULL,
266 };
267
268 rm_rf_kcore_dir(path);
269
270 return rm_rf_depth_pat(path, 0, pat);
271}
272
273int rm_rf(const char *path)
274{
275 return rm_rf_depth_pat(path, INT_MAX, NULL);
276}
277
278/* A filter which removes dot files */
279bool lsdir_no_dot_filter(const char *name __maybe_unused, struct dirent *d)
280{
281 return d->d_name[0] != '.';
282}
283
284/* lsdir reads a directory and store it in strlist */
285struct strlist *lsdir(const char *name,
286 bool (*filter)(const char *, struct dirent *))
287{
288 struct strlist *list = NULL;
289 DIR *dir;
290 struct dirent *d;
291
292 dir = opendir(name);
293 if (!dir)
294 return NULL;
295
296 list = strlist__new(NULL, NULL);
297 if (!list) {
298 errno = ENOMEM;
299 goto out;
300 }
301
302 while ((d = readdir(dir)) != NULL) {
303 if (!filter || filter(name, d))
304 strlist__add(list, d->d_name);
305 }
306
307out:
308 closedir(dir);
309 return list;
310}
311
312size_t hex_width(u64 v)
313{
314 size_t n = 1;
315
316 while ((v >>= 4))
317 ++n;
318
319 return n;
320}
321
322int perf_event_paranoid(void)
323{
324 int value;
325
326 if (sysctl__read_int("kernel/perf_event_paranoid", &value))
327 return INT_MAX;
328
329 return value;
330}
331
332bool perf_event_paranoid_check(int max_level)
333{
334 bool used_root;
335
336 if (perf_cap__capable(CAP_SYS_ADMIN, &used_root))
337 return true;
338
339 if (!used_root && perf_cap__capable(CAP_PERFMON, &used_root))
340 return true;
341
342 return perf_event_paranoid() <= max_level;
343}
344
345int perf_tip(char **strp, const char *dirpath)
346{
347 struct strlist *tips;
348 struct str_node *node;
349 struct strlist_config conf = {
350 .dirname = dirpath,
351 .file_only = true,
352 };
353 int ret = 0;
354
355 *strp = NULL;
356 tips = strlist__new("tips.txt", &conf);
357 if (tips == NULL)
358 return -errno;
359
360 if (strlist__nr_entries(tips) == 0)
361 goto out;
362
363 node = strlist__entry(tips, random() % strlist__nr_entries(tips));
364 if (asprintf(strp, "Tip: %s", node->s) < 0)
365 ret = -ENOMEM;
366
367out:
368 strlist__delete(tips);
369
370 return ret;
371}
372
373char *perf_exe(char *buf, int len)
374{
375 int n = readlink("/proc/self/exe", buf, len);
376 if (n > 0) {
377 buf[n] = 0;
378 return buf;
379 }
380 return strcpy(buf, "perf");
381}
382
383void perf_debuginfod_setup(struct perf_debuginfod *di)
384{
385 /*
386 * By default '!di->set' we clear DEBUGINFOD_URLS, so debuginfod
387 * processing is not triggered, otherwise we set it to 'di->urls'
388 * value. If 'di->urls' is "system" we keep DEBUGINFOD_URLS value.
389 */
390 if (!di->set)
391 setenv("DEBUGINFOD_URLS", "", 1);
392 else if (di->urls && strcmp(di->urls, "system"))
393 setenv("DEBUGINFOD_URLS", di->urls, 1);
394
395 pr_debug("DEBUGINFOD_URLS=%s\n", getenv("DEBUGINFOD_URLS"));
396
397#ifndef HAVE_DEBUGINFOD_SUPPORT
398 if (di->set)
399 pr_warning("WARNING: debuginfod support requested, but perf is not built with it\n");
400#endif
401}
402
403/*
404 * Return a new filename prepended with task's root directory if it's in
405 * a chroot. Callers should free the returned string.
406 */
407char *filename_with_chroot(int pid, const char *filename)
408{
409 char buf[PATH_MAX];
410 char proc_root[32];
411 char *new_name = NULL;
412 int ret;
413
414 scnprintf(proc_root, sizeof(proc_root), "/proc/%d/root", pid);
415 ret = readlink(proc_root, buf, sizeof(buf) - 1);
416 if (ret <= 0)
417 return NULL;
418
419 /* readlink(2) does not append a null byte to buf */
420 buf[ret] = '\0';
421
422 if (!strcmp(buf, "/"))
423 return NULL;
424
425 if (strstr(buf, "(deleted)"))
426 return NULL;
427
428 if (asprintf(&new_name, "%s/%s", buf, filename) < 0)
429 return NULL;
430
431 return new_name;
432}
433
434/*
435 * Reallocate an array *arr of size *arr_sz so that it is big enough to contain
436 * x elements of size msz, initializing new entries to *init_val or zero if
437 * init_val is NULL
438 */
439int do_realloc_array_as_needed(void **arr, size_t *arr_sz, size_t x, size_t msz, const void *init_val)
440{
441 size_t new_sz = *arr_sz;
442 void *new_arr;
443 size_t i;
444
445 if (!new_sz)
446 new_sz = msz >= 64 ? 1 : roundup(64, msz); /* Start with at least 64 bytes */
447 while (x >= new_sz) {
448 if (check_mul_overflow(new_sz, (size_t)2, &new_sz))
449 return -ENOMEM;
450 }
451 if (new_sz == *arr_sz)
452 return 0;
453 new_arr = calloc(new_sz, msz);
454 if (!new_arr)
455 return -ENOMEM;
456 if (*arr_sz)
457 memcpy(new_arr, *arr, *arr_sz * msz);
458 if (init_val) {
459 for (i = *arr_sz; i < new_sz; i++)
460 memcpy(new_arr + (i * msz), init_val, msz);
461 }
462 *arr = new_arr;
463 *arr_sz = new_sz;
464 return 0;
465}
466
467#ifndef HAVE_SCHED_GETCPU_SUPPORT
468int sched_getcpu(void)
469{
470#ifdef __NR_getcpu
471 unsigned int cpu;
472 int err = syscall(__NR_getcpu, &cpu, NULL, NULL);
473
474 if (!err)
475 return cpu;
476#else
477 errno = ENOSYS;
478#endif
479 return -1;
480}
481#endif
482
483#ifndef HAVE_SCANDIRAT_SUPPORT
484int scandirat(int dirfd, const char *dirp,
485 struct dirent ***namelist,
486 int (*filter)(const struct dirent *),
487 int (*compar)(const struct dirent **, const struct dirent **))
488{
489 char path[PATH_MAX];
490 int err, fd = openat(dirfd, dirp, O_PATH);
491
492 if (fd < 0)
493 return fd;
494
495 snprintf(path, sizeof(path), "/proc/%d/fd/%d", getpid(), fd);
496 err = scandir(path, namelist, filter, compar);
497 close(fd);
498 return err;
499}
500#endif
1// SPDX-License-Identifier: GPL-2.0
2#include "util.h"
3#include "debug.h"
4#include "event.h"
5#include <api/fs/fs.h>
6#include <sys/stat.h>
7#include <sys/utsname.h>
8#include <dirent.h>
9#include <fcntl.h>
10#include <inttypes.h>
11#include <signal.h>
12#include <stdio.h>
13#include <stdlib.h>
14#include <string.h>
15#include <errno.h>
16#include <limits.h>
17#include <linux/capability.h>
18#include <linux/kernel.h>
19#include <linux/log2.h>
20#include <linux/time64.h>
21#include <unistd.h>
22#include "cap.h"
23#include "strlist.h"
24#include "string2.h"
25
26/*
27 * XXX We need to find a better place for these things...
28 */
29
30bool perf_singlethreaded = true;
31
32void perf_set_singlethreaded(void)
33{
34 perf_singlethreaded = true;
35}
36
37void perf_set_multithreaded(void)
38{
39 perf_singlethreaded = false;
40}
41
42int sysctl_perf_event_max_stack = PERF_MAX_STACK_DEPTH;
43int sysctl_perf_event_max_contexts_per_stack = PERF_MAX_CONTEXTS_PER_STACK;
44
45int sysctl__max_stack(void)
46{
47 int value;
48
49 if (sysctl__read_int("kernel/perf_event_max_stack", &value) == 0)
50 sysctl_perf_event_max_stack = value;
51
52 if (sysctl__read_int("kernel/perf_event_max_contexts_per_stack", &value) == 0)
53 sysctl_perf_event_max_contexts_per_stack = value;
54
55 return sysctl_perf_event_max_stack;
56}
57
58bool sysctl__nmi_watchdog_enabled(void)
59{
60 static bool cached;
61 static bool nmi_watchdog;
62 int value;
63
64 if (cached)
65 return nmi_watchdog;
66
67 if (sysctl__read_int("kernel/nmi_watchdog", &value) < 0)
68 return false;
69
70 nmi_watchdog = (value > 0) ? true : false;
71 cached = true;
72
73 return nmi_watchdog;
74}
75
76bool test_attr__enabled;
77
78bool perf_host = true;
79bool perf_guest = false;
80
81void event_attr_init(struct perf_event_attr *attr)
82{
83 if (!perf_host)
84 attr->exclude_host = 1;
85 if (!perf_guest)
86 attr->exclude_guest = 1;
87 /* to capture ABI version */
88 attr->size = sizeof(*attr);
89}
90
91int mkdir_p(char *path, mode_t mode)
92{
93 struct stat st;
94 int err;
95 char *d = path;
96
97 if (*d != '/')
98 return -1;
99
100 if (stat(path, &st) == 0)
101 return 0;
102
103 while (*++d == '/');
104
105 while ((d = strchr(d, '/'))) {
106 *d = '\0';
107 err = stat(path, &st) && mkdir(path, mode);
108 *d++ = '/';
109 if (err)
110 return -1;
111 while (*d == '/')
112 ++d;
113 }
114 return (stat(path, &st) && mkdir(path, mode)) ? -1 : 0;
115}
116
117static bool match_pat(char *file, const char **pat)
118{
119 int i = 0;
120
121 if (!pat)
122 return true;
123
124 while (pat[i]) {
125 if (strglobmatch(file, pat[i]))
126 return true;
127
128 i++;
129 }
130
131 return false;
132}
133
134/*
135 * The depth specify how deep the removal will go.
136 * 0 - will remove only files under the 'path' directory
137 * 1 .. x - will dive in x-level deep under the 'path' directory
138 *
139 * If specified the pat is array of string patterns ended with NULL,
140 * which are checked upon every file/directory found. Only matching
141 * ones are removed.
142 *
143 * The function returns:
144 * 0 on success
145 * -1 on removal failure with errno set
146 * -2 on pattern failure
147 */
148static int rm_rf_depth_pat(const char *path, int depth, const char **pat)
149{
150 DIR *dir;
151 int ret;
152 struct dirent *d;
153 char namebuf[PATH_MAX];
154 struct stat statbuf;
155
156 /* Do not fail if there's no file. */
157 ret = lstat(path, &statbuf);
158 if (ret)
159 return 0;
160
161 /* Try to remove any file we get. */
162 if (!(statbuf.st_mode & S_IFDIR))
163 return unlink(path);
164
165 /* We have directory in path. */
166 dir = opendir(path);
167 if (dir == NULL)
168 return -1;
169
170 while ((d = readdir(dir)) != NULL && !ret) {
171
172 if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
173 continue;
174
175 if (!match_pat(d->d_name, pat)) {
176 ret = -2;
177 break;
178 }
179
180 scnprintf(namebuf, sizeof(namebuf), "%s/%s",
181 path, d->d_name);
182
183 /* We have to check symbolic link itself */
184 ret = lstat(namebuf, &statbuf);
185 if (ret < 0) {
186 pr_debug("stat failed: %s\n", namebuf);
187 break;
188 }
189
190 if (S_ISDIR(statbuf.st_mode))
191 ret = depth ? rm_rf_depth_pat(namebuf, depth - 1, pat) : 0;
192 else
193 ret = unlink(namebuf);
194 }
195 closedir(dir);
196
197 if (ret < 0)
198 return ret;
199
200 return rmdir(path);
201}
202
203static int rm_rf_kcore_dir(const char *path)
204{
205 char kcore_dir_path[PATH_MAX];
206 const char *pat[] = {
207 "kcore",
208 "kallsyms",
209 "modules",
210 NULL,
211 };
212
213 snprintf(kcore_dir_path, sizeof(kcore_dir_path), "%s/kcore_dir", path);
214
215 return rm_rf_depth_pat(kcore_dir_path, 0, pat);
216}
217
218int rm_rf_perf_data(const char *path)
219{
220 const char *pat[] = {
221 "data",
222 "data.*",
223 NULL,
224 };
225
226 rm_rf_kcore_dir(path);
227
228 return rm_rf_depth_pat(path, 0, pat);
229}
230
231int rm_rf(const char *path)
232{
233 return rm_rf_depth_pat(path, INT_MAX, NULL);
234}
235
236/* A filter which removes dot files */
237bool lsdir_no_dot_filter(const char *name __maybe_unused, struct dirent *d)
238{
239 return d->d_name[0] != '.';
240}
241
242/* lsdir reads a directory and store it in strlist */
243struct strlist *lsdir(const char *name,
244 bool (*filter)(const char *, struct dirent *))
245{
246 struct strlist *list = NULL;
247 DIR *dir;
248 struct dirent *d;
249
250 dir = opendir(name);
251 if (!dir)
252 return NULL;
253
254 list = strlist__new(NULL, NULL);
255 if (!list) {
256 errno = ENOMEM;
257 goto out;
258 }
259
260 while ((d = readdir(dir)) != NULL) {
261 if (!filter || filter(name, d))
262 strlist__add(list, d->d_name);
263 }
264
265out:
266 closedir(dir);
267 return list;
268}
269
270size_t hex_width(u64 v)
271{
272 size_t n = 1;
273
274 while ((v >>= 4))
275 ++n;
276
277 return n;
278}
279
280int perf_event_paranoid(void)
281{
282 int value;
283
284 if (sysctl__read_int("kernel/perf_event_paranoid", &value))
285 return INT_MAX;
286
287 return value;
288}
289
290bool perf_event_paranoid_check(int max_level)
291{
292 return perf_cap__capable(CAP_SYS_ADMIN) ||
293 perf_cap__capable(CAP_PERFMON) ||
294 perf_event_paranoid() <= max_level;
295}
296
297static int
298fetch_ubuntu_kernel_version(unsigned int *puint)
299{
300 ssize_t len;
301 size_t line_len = 0;
302 char *ptr, *line = NULL;
303 int version, patchlevel, sublevel, err;
304 FILE *vsig;
305
306 if (!puint)
307 return 0;
308
309 vsig = fopen("/proc/version_signature", "r");
310 if (!vsig) {
311 pr_debug("Open /proc/version_signature failed: %s\n",
312 strerror(errno));
313 return -1;
314 }
315
316 len = getline(&line, &line_len, vsig);
317 fclose(vsig);
318 err = -1;
319 if (len <= 0) {
320 pr_debug("Reading from /proc/version_signature failed: %s\n",
321 strerror(errno));
322 goto errout;
323 }
324
325 ptr = strrchr(line, ' ');
326 if (!ptr) {
327 pr_debug("Parsing /proc/version_signature failed: %s\n", line);
328 goto errout;
329 }
330
331 err = sscanf(ptr + 1, "%d.%d.%d",
332 &version, &patchlevel, &sublevel);
333 if (err != 3) {
334 pr_debug("Unable to get kernel version from /proc/version_signature '%s'\n",
335 line);
336 goto errout;
337 }
338
339 *puint = (version << 16) + (patchlevel << 8) + sublevel;
340 err = 0;
341errout:
342 free(line);
343 return err;
344}
345
346int
347fetch_kernel_version(unsigned int *puint, char *str,
348 size_t str_size)
349{
350 struct utsname utsname;
351 int version, patchlevel, sublevel, err;
352 bool int_ver_ready = false;
353
354 if (access("/proc/version_signature", R_OK) == 0)
355 if (!fetch_ubuntu_kernel_version(puint))
356 int_ver_ready = true;
357
358 if (uname(&utsname))
359 return -1;
360
361 if (str && str_size) {
362 strncpy(str, utsname.release, str_size);
363 str[str_size - 1] = '\0';
364 }
365
366 if (!puint || int_ver_ready)
367 return 0;
368
369 err = sscanf(utsname.release, "%d.%d.%d",
370 &version, &patchlevel, &sublevel);
371
372 if (err != 3) {
373 pr_debug("Unable to get kernel version from uname '%s'\n",
374 utsname.release);
375 return -1;
376 }
377
378 *puint = (version << 16) + (patchlevel << 8) + sublevel;
379 return 0;
380}
381
382const char *perf_tip(const char *dirpath)
383{
384 struct strlist *tips;
385 struct str_node *node;
386 char *tip = NULL;
387 struct strlist_config conf = {
388 .dirname = dirpath,
389 .file_only = true,
390 };
391
392 tips = strlist__new("tips.txt", &conf);
393 if (tips == NULL)
394 return errno == ENOENT ? NULL :
395 "Tip: check path of tips.txt or get more memory! ;-p";
396
397 if (strlist__nr_entries(tips) == 0)
398 goto out;
399
400 node = strlist__entry(tips, random() % strlist__nr_entries(tips));
401 if (asprintf(&tip, "Tip: %s", node->s) < 0)
402 tip = (char *)"Tip: get more memory! ;-)";
403
404out:
405 strlist__delete(tips);
406
407 return tip;
408}
409
410char *perf_exe(char *buf, int len)
411{
412 int n = readlink("/proc/self/exe", buf, len);
413 if (n > 0) {
414 buf[n] = 0;
415 return buf;
416 }
417 return strcpy(buf, "perf");
418}